sb-as logo
Story image

nCipher introduces cloud-first architecture

nCipher Security has announced two new additions to its nShield hardware security module (HSM) portfolio that make it simpler to deploy applications in the cloud and bring greater security and control to clouds.

nShield Web Services Option Pack 

This pack simplifies deployment for cloud-first data centres.

nShield Web Services Option Pack provides a REST API between applications requiring cryptographic key and data protection services and nShield HSM

This enables application deployment underpinned by high-assurance nShield HSMs, which can scale to meet the needs of data centres.

Customers can also use their own load-balancing appliances to handle the HSM workload, simplifying the HSM deployment and configuration, and ensuring the best utilisation of their HSM pools.

nShield Container Option Pack 

This pack enables nShield HSMs to operate seamlessly within a containerised environment.

Containerisation has become the model of choice in forward-thinking cloud and enterprise deployments, offering scaling, flexibility and orchestration.

The nShield Container Option Pack allows developers to leverage the advantages of container platforms while accessing a high-assurance nShield HSM.

The nShield HSM processes sensitive data and key material, reducing the time required to develop and deploy secure containerised applications.

nShield HSMs offer integration with application containers, making it easier to build HSM support into containerised solutions.

The nShield Container Option Pack provides a template deployment model that allows customers to focus on the containerised application without having to worry about HSM integration.

“One of the biggest drivers of digital transformation is the widespread enterprise adoption of cloud - IDC predicts that 70% of new enterprise's applications will be developed cloud-native by 2021,” says nCipher Security chief strategy officer Peter Galvin.

“As organisations increasingly adopt cloud-first strategies and operate in multi-cloud environments, security concerns remain - from visibility into the data protection architecture to managing complex security policies and encryption keys that secure applications and data,” says Galvin.

 “The new nShield Web Services Option Pack and nShield Container Option Pack help cut development times and budgets, allowing customers to harness cloud platforms without losing control of their keys or their data.”

nCipher’s nShield HSM portfolio also includes the following solutions for customers pursuing a cloud-first strategy:

nShield as a Service

A subscription-based service which provides development and deployment teams with access to dedicated cloud-based nShield Connect HSMs.

This allows organisations to migrate to cloud-centric strategies while also maintaining strict security controls required for business-critical applications.

This supports changing business preferences for operational instead of capital expenses, aligns with modern development workflows and decreases the time spent by security personnel on maintenance and monitoring tasks.

Bring Your Own Key

Used in conjunction with nShield HSMs, you can Bring Your Own Keys (BYOK) to your cloud applications, whether you are using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure.

nShield high-assurance HSMs enable customers to continue to benefit from the flexibility and economy of cloud services, while strengthening the security of their key management practices and gaining greater control over their keys.

Story image
RedShield develops 'virtual shield' to protect against SAP RECON vulnerability
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server. More
Download image
451 Research: The new shape of the enterprise network
In this new world, distance has become the silent digital business killer. Latency looms large, especially for high-performance edge applications, IoT and 5G use cases. More
Story image
Security teams face mounting stress, call for execs to step in
“With more organisations operating under remote work conditions, the attack surface has broadened, making security at scale a critical concern. This is a call to action for executives to prioritise alleviating the stress."More
Story image
Interview: ThreatQuotient champions threat intelligence through virtual 'situation rooms'
To understand what it involves and some of the collaboration challenges that come with distributing threat intelligence amongst specialised security teams, we spoke to ThreatQuotient APJC regional director Anthony Stitt.More
Story image
A third of millennials think they're 'too boring' to be victim of cyber attack
While many millennials are concerned at how their data is being used and whether they are being targeted by cyber-attackers, according to Kaspersky any potential action taken to tighten their online security is at ‘the bottom of their to-do list’.More
Link image
Compromise is no longer needed for quality authentication
Many authentication tools have a trade-off: get secure identity verification, but sacrifice usability. Here's how to get the best of both worlds.More